HackerOne Blog
Read the HackerOne blog to learn strategies for strengthening your attack resistance with help from highly skilled ethical hackers. Improve your security profile and stay up to date on industry trends and emerging threats.
What Is a Security.txt File and How Can It Help Your Program?
Security.txt is a security mechanism that allows your organization to provide its vulnerability disclosure policy and contact information in a...
What Is a Security.txt File and How Can It Help Your Program?
5 Ways I Provide Value as a PullRequest Reviewer When I Start Reviewing a New Project
Important reviewer traits for providing a great code review include prior knowledge and experience, expertise...
HackerOne Announces a New Customer Pentest Setup that's More Efficient and Speeds Time to Launch
Understanding Public and Private Bug Bounties and Vulnerability Disclosure Programs
What is Attack Resistance Management?
A Security Survey on How to Close Your Organization's Attack Resistance Gap
Why HackerOne Acquired Pull Request and What It Means to Our Customers
Announcing the Results of the 12-month DIB-VDP Pilot
How Wix Improves Their Security Posture with Ethical Hackers
Reducing risk is fundamental to Wix’s approach to cybersecurity, and as the threat landscape evolves, they...